[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: Tor server "nami" taken by the German Police

On Wed, 30 Sep 2009, tor@xxxxxxxxxxxx wrote:

For residential IPs it is not possible to distinguish a tor node from a
person. Only recently I was thinking that German police probably learned
from their first raid. Now this is coming along, but again, they
couldn't know it was a tor node until they visited the friendly bloke.
Would be interesting to know if any colo machines have been affected
again after the 2007 incident.

I would also very much like to know this.

In addition, I would be very interested in knowing who authorities are eventually passed through to in a colo/datacenter scenario.

If a full service datacenter gives a multi-rack ISP a /24 or /22, and then that ISP sells a half rack to a VPS provider who sells a VPS to an end user who then runs an exit node ... does a police contact ever even make it to the end user ?

Finally, what generalizations can be made about the behaviors that eventually lead to a police interaction ? Is it a website on the public Internet that is either taken over, or run from day one as a sting, and they collect the IPs that connect ? Is it news postings that appear to come from a particular IP ? I don't see a raid coming as the result of a hidden service - where would an IP come from to point to that ?
To unsubscribe, send an e-mail to majordomo@xxxxxxxxxxxxxx with
unsubscribe or-talk    in the body. http://archives.seul.org/or/talk/